Sentrigo discovered a new security hole in SQL Server, but so far Microsoft isn't paying attention. Let me show you why they should Last week Sentrigo brought a security hole in SQL Server to my ...
How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots Like so much of IT, database security requirements largely ...
Microsoft SQL Server installation is simple when system requirements and edition choices are planned.Choosing the right authentication mode, such as ...
The world of the data professionals and DBAs is swirling with threats and risks, and those dangers are on the rise. You’re probably accustomed to using longstanding database features to secure your ...
A few days ago, Microsoft shocked us when it announced that it would soon bring its SQL Server database to Linux. It’ll take until 2017 before SQL Server will be available on Linux, though. Until then ...
SQL Server has a long list of roles for server, database, and applications that outline things like permissions, data selection and modification, and disk management. Examine how roles play a part in ...
Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...
I have worked with SQL Server for many years now, back to Sybase SQL Server days and there has always been confusion over Logins and Users. Even though they typically use the same name they are ...
In my next several posts, I'd like to take a good look at SQL Server security. We'll primarily focus on SQL Server 2008 R2, which is the latest release. Many of the concepts I plan to discuss will ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果